parallel
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFE
Full Analysis
- [INDIRECT_PROMPT_INJECTION]: The skill is designed to fetch and process content from external URLs and web search results, which introduces an attack surface for indirect prompt injection.
- Ingestion points: The
searchandextractcommands in theparallelscript ingest data from external websites via the Parallel.ai API. - Boundary markers: The script utilizes Markdown headers (e.g.,
## {title}) and horizontal rules (---) to delineate different pieces of fetched content, providing some structure for the agent. - Capability inventory: The skill is restricted to making network requests to the
api.parallel.aidomain using thehttpxlibrary. It does not perform local file writes, subprocess execution, or dynamic code evaluation. - Sanitization: The tool converts API responses into Markdown formatted text before presenting them to the agent, reducing the likelihood of accidental control character execution, though it does not explicitly filter for embedded instructions within the text.
- [COMMAND_EXECUTION]: The script uses
httpxfor structured API calls. While it includes arawcommand for interacting with the API, it is restricted to theapi.parallel.aibase URL, preventing arbitrary network access to other domains. - [DATA_EXFILTRATION]: The skill requires a
PARALLEL_API_KEYprovided via environment variables, which is a secure method of credential management. Search queries and URLs are transmitted to the intended service provider.
Audit Metadata